From d6764fd96bf6bbb5e05877f6abfa75a67e762d50 Mon Sep 17 00:00:00 2001 From: Chaitanya Tata Date: Sat, 29 Mar 2025 21:45:12 +0530 Subject: [PATCH] doc: nrf70: enterprise: Point to the upstream docs Upstream already has the proper instructions, so, remove duplication and point to the upstream docs. Signed-off-by: Chaitanya Tata --- .../nrf70/wifi_advanced_security_modes.rst | 46 +------------------ 1 file changed, 1 insertion(+), 45 deletions(-) diff --git a/doc/nrf/app_dev/device_guides/nrf70/wifi_advanced_security_modes.rst b/doc/nrf/app_dev/device_guides/nrf70/wifi_advanced_security_modes.rst index 754854cfa9f7..0a7acf82f410 100644 --- a/doc/nrf/app_dev/device_guides/nrf70/wifi_advanced_security_modes.rst +++ b/doc/nrf/app_dev/device_guides/nrf70/wifi_advanced_security_modes.rst @@ -18,52 +18,8 @@ The nRF70 Series devices support the following Wi-Fi enterprise security mode, ` This mode uses the Extensible Authentication Protocol (EAP) with Transport Layer Security (TLS) for authentication. The client and the authentication server exchange certificates to authenticate each other. +See `Zephyr Wi-Fi management`_ for more information on how to configure and use the Wi-Fi enterprise security mode. -Enterprise testing: X.509 certificate headers generation -======================================================== - -Wi-Fi enterprise security requires use of X.509 certificates. -Test certificates in PEM format are available at :zephyr_file:`samples/net/wifi/test_certs/` repository. -During the build process, the certificates are converted to a C header file that is included in the Wi-Fi shell module or the :ref:`Wi-Fi credentials ` library. - -To use custom certificates, use the following commands: - -.. code-block:: bash - - $ cp client.pem samples/net/wifi/test_certs/ - $ cp client-key.pem samples/net/wifi/test_certs/ - $ cp ca.pem samples/net/wifi/test_certs/ - $ cp client.pem samples/net/wifi/test_certs/client2.pem - $ cp client-key.pem samples/net/wifi/test_certs/client-key2.pem - $ cp ca.pem samples/net/wifi/test_certs/ca2.pem - - $ west build -p -b samples/net/wifi -- -DEXTRA_CONF_FILE=overlay-enterprise.conf - -.. note:: - The EAP phase2 certificates (suffixed with 2) are unused in ``WPA2-EAP-TLS`` but are mandatory for building the sample application. - The phase1 certificates are copied as phase2 certificates to avoid build errors as a temporary workaround. - -To establish a Wi-Fi connection, use the following command: - -.. code-block:: console - - uart:~$ wifi connect -s -k 7 -a anon -K - -.. code-block:: console - - uart:~$ wifi_cred add -s -k 7 -a anon -K - - -.. note:: - - The Wi-Fi credentials only support 16characters for the anonymous identity and the key passphrase. - -The server certificate is also provided in the same directory for testing purposes. -You can use any AAA server for testing purposes, such as FreeRADIUS or hostapd. - -.. note:: - - The certificates are for testing purposes only and should not be used for production. .. _ug_nrf70_developing_wifi_psa_support: